4.3

CVE-2009-0023

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheApr-util Version <= 1.3.4
ApacheApr-util Version0.9.1
ApacheApr-util Version0.9.2
ApacheApr-util Version0.9.3
ApacheApr-util Version0.9.4
ApacheApr-util Version0.9.5
ApacheApr-util Version1.0
ApacheApr-util Version1.0.1
ApacheApr-util Version1.0.2
ApacheApr-util Version1.1.0
ApacheApr-util Version1.1.1
ApacheApr-util Version1.1.2
ApacheApr-util Version1.2.1
ApacheApr-util Version1.2.2
ApacheApr-util Version1.2.6
ApacheApr-util Version1.2.7
ApacheApr-util Version1.2.8
ApacheApr-util Version1.3.0
ApacheApr-util Version1.3.1
ApacheApr-util Version1.3.2
ApacheApr-util Version1.3.3
ApacheHTTP Server Version >= 2.2.0 < 2.2.12
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 10.07% 0.928
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://secunia.com/advisories/35284
Third Party Advisory
Vendor Advisory
http://secunia.com/advisories/35360
Third Party Advisory
Vendor Advisory
http://www.securityfocus.com/bid/35221
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=503928
Patch
Third Party Advisory
Issue Tracking